Information assurance aims to protect information and systems from attacks through application security. This ensures confidentiality by preventing unauthorized access to information, integrity by maintaining accurate data over its lifecycle, and availability by ensuring systems and information are accessible when needed. It also provides non-repudiation so that transactions cannot be denied by either party, and authentication to validate the genuineness of data and identities of parties involved.
Information assurance aims to protect information and systems from attacks through application security. This ensures confidentiality by preventing unauthorized access to information, integrity by maintaining accurate data over its lifecycle, and availability by ensuring systems and information are accessible when needed. It also provides non-repudiation so that transactions cannot be denied by either party, and authentication to validate the genuineness of data and identities of parties involved.
Information assurance aims to protect information and systems from attacks through application security. This ensures confidentiality by preventing unauthorized access to information, integrity by maintaining accurate data over its lifecycle, and availability by ensuring systems and information are accessible when needed. It also provides non-repudiation so that transactions cannot be denied by either party, and authentication to validate the genuineness of data and identities of parties involved.
is achieved only when the information and its systems
are protected against attacks by means of the application security. + + CONFIDENTIALITY Refer to preventing the disclosure of information to unauthorized individuals or systems.
E.g : Credit Card Transaction on the
internet INTEGRITY Maintaining and assuring the accuracy and consistency of data over its entire life cycle. This mean that data cannot be modified in an unauthorized or undetected manner. E.g : Amount transacted on the internet AVAILIABILITY For any information system to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store and process the information, the security controls used to protect it, and the communication channels used to access it must be functioning correctly. NON-REPUDIATION In law, non-repudiation implies one’s intention to fulfill their obligations to contract. It also implies that one party of transaction cannot deny having received a transaction nor can the other party deny having sent a transaction. E.g : Cyptographic System AUTHENTICATION It is necessary to ensure that the data, transaction, communications or documents are genuine. It is also important for authenticity to validate that both parties involve are who they claim to be. E.g : Digital Signature